The present invention relates generally to data devices.
Various types of data devices are known.
The present invention seeks to provide an improved data entry device.
There is thus provided in accordance with a preferred embodiment of the present invention a data entry device including a housing, data entry circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements which, when depressed, are displaced to at least a predetermined extent from a first location within the housing to a second location within the housing and Optical Finger Navigation (OFN) circuitry mounted inside the housing, being operative for sensing at least some of the plurality of movable key elements when depressed and displaced to at least the predetermined extent from the first location within the housing to the second location within the housing and providing a key displacement output indicating key displacement to the data entry circuitry.
There is also provided in accordance with another preferred embodiment of the present invention a data entry device including a housing, data entry circuitry located within the housing, tamper detection circuitry located within the housing, a keypad mounted in the housing and having a plurality of movable key elements and OFN circuitry mounted inside the housing, being operative for sensing displacement of the plurality of movable key elements and tampering with the device and providing a key displacement output indicating key displacement to at least a predetermined extent to the data entry circuitry and a tamper indication output to the tamper detection circuitry.
There is further provided in accordance with yet another preferred embodiment of the present invention a sensitive data device including a housing, sensitive data handling circuitry located within the housing, tamper detection circuitry located within the housing and OFN circuitry mounted inside the housing, being operative for sensing tampering with the device and providing a tamper indication output to the tamper detection circuitry.
Preferably, the OFN circuitry is mounted on an electrical circuit board spaced from the movable key elements. Additionally, the device also includes a spacer mounted between the electrical circuit board and the keypad.
Preferably, the electrical circuit board is arranged such that displacement of a key from a first location within the housing to a second location within the housing by the finger of a user is detected and identified by the OFN circuitry.
In accordance with a preferred embodiment of the present invention the OFN circuitry is incorporated within an OFN module which includes an illuminator and optics. Additionally, the OFN module is generally centered with respect to the plurality of movable key elements and lies therebelow so as to be in a line of sight with all of the plurality of movable key elements. Preferably, the OFN module is also in a line of sight with other regions within the housing.
In accordance with a preferred embodiment of the present invention the OFN module views optically identifiable markings on the plurality of movable key elements as well as other objects which provide a background useful in detecting tampering. Additionally or alternatively, a background output of the OFN module is employed as a reference against which an output of said OFN module indicating possible tampering is compared. Preferably, at least one of the following events produces a tampering indication: creating a hole in the data entry device using a tool, the tool being seen by the OFN module and removal of the tool, allowing light to enter the housing, the light being seen by the OFN module.
Accordingly, even if tampering occurs in a darkened environment, such tampering will be detected.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Reference is now made to
As seen in
An optional anti-tamper circuit board 112, which preferably includes an anti-tampering grid 114 formed of a multiplicity of interconnected anti-tampering electrical conductors 116, underlies top surface 104 and is provided with key apertures 120 in registration with key apertures 110. Fixedly and electrically coupled to anti-tamper circuit board 112 is a peripheral anti-tamper keypad enclosure 122, which preferably includes an anti-tampering grid 124 formed of a multiplicity of interconnected anti-tampering electrical conductors.
A key mat 132, preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 134, preferably integrally formed with mat 132, which partially extend through key apertures 110 and 120 and preferably have readily optically identifiable markings 136 formed on corresponding bottom facing surfaces 138 thereof. Additional optically identifiable markings 139 may be provided on other interior surfaces, such as inner surfaces of the housing.
An electrical circuit board 140, which functions, inter alia, as a mounting board for an OFN module 142, is disposed in predetermined spaced relationship with key mat 132. OFN module 142 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C. The arrangement of key mat 132 and of electrical circuit board 140 is such that depression of a key 134 by the finger of a user is detected and identified by OFN module 142. It is noted that the OFN module 142 is operative to sense changes in the level of light received by it from various locations within its field of view.
In the illustrated embodiment of
A spacer 143, preferably formed of a transparent material or defining open side walls, is provided between electrical circuit board 140 and key mat 132 in order to enhance the ability of the OFN module 142 to view not only all of the markings on all of the keys but also as much as possible of the interior of the housing and the markings and features thereof.
Circuit board 140 preferably includes an anti-tampering grid 144 formed of a multiplicity of interconnected anti-tampering electrical conductors.
It is appreciated that the anti tampering grids 144, 114 and 124 and enclosure 122 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 160. Anti-tampering detection circuitry 160 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 160 may itself be secure against tampering.
It is appreciated that the anti-tampering grids can be interconnected in numerous ways using various types of connectors.
In accordance with a preferred embodiment of the present invention, the OFN module 142 functions, inter alia, as a case-open switch which senses physical tampering with and opening of the housing. The output of the OFN module is preferably provided to anti-tampering detection circuitry 160 to enable the output of the OFN module to be used for detection of tampering. Upon detection of tampering one or both of the following actions may take place:
registration of a tampered condition and prevention of data entry, such as PIN entry.
It is appreciated that not all key displacements need be sensed by the OFN module. For example, the key displacements of one or more function keys, such as keys 162, 164, 166 and 168, may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 174, 176 and 178.
Preferably, the secure keypad device 100 includes a main microprocessor 180 which preferably includes, inter alia, encryption/decryption capabilities. Such a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
As seen in
An anti-tamper circuit board 312, which preferably includes an anti-tampering grid 314 formed of a multiplicity of interconnected anti-tampering electrical conductors 316, underlies top surface 304 and is provided with key apertures 320 in registration with key apertures 310. Fixedly and electrically coupled to anti-tamper circuit board 312 is a peripheral anti-tamper keypad enclosure 322, which preferably includes an anti-tampering grid 324 formed of a multiplicity of interconnected anti-tampering electrical conductors.
A key mat 332, preferably formed of a resilient plastic or rubber, defines a plurality of depressible keys 334, preferably integrally formed with mat 332, which partially extend through key apertures 310 and 320 and preferably have readily optically identifiable markings 336 formed on corresponding bottom facing surfaces 338 thereof. Additional optically identifiable markings 339 may be provided on other interior surfaces, such as inner surfaces of the housing.
An electrical circuit board 340, which functions, inter alia, as a mounting board for an OFN module 342, is disposed in predetermined spaced relationship with key mat 332. OFN module 342 is preferably a Model ADBS-A350 commercially available from Pixart Imaging Inc., No. 5, Innovation Road 1, HsinChu Science Park, Hsin-Chu, Taiwan, R.O.C. The arrangement of key mat 332 and of electrical circuit board 340 is such that depression of a key 334 by the finger of a user is detected and identified by OFN module 342. In the illustrated embodiment of
Circuit board 340 preferably includes an anti-tampering grid 344 formed of a multiplicity of interconnected anti-tampering electrical conductors.
It is appreciated that the anti tampering grids 344, 314 and 324 and enclosure 322 are preferably interconnected so as to define a keyboard anti-tampering enclosure, which is coupled to anti-tampering detection circuitry 360. Anti-tampering detection circuitry 360 is typically enclosed in an anti-tampering enclosure (not shown). Alternatively, anti-tampering detection circuitry 360 may itself be secure against tampering.
It is appreciated that the anti-tampering grids can be interconnected in numerous ways using various types of connectors.
In accordance with a preferred embodiment of the present invention, the OFN module functions, inter alia, as a case-open switch which senses physical tampering and opening of the housing. The output of the OFN module is preferably provided to anti-tampering detection circuitry 360 to enable the output of the OFN module to be used for detection of tampering.
It is appreciated that not all key displacements need be sensed by the OFN module. For example, the key displacements of one or more function keys, such as keys 362, 364, 366 and 368, may be sensed by engagement thereof with corresponding conventional electrical contacts, such as contacts 374, 376 and 378.
Preferably, the secure keypad device 300 includes a main microprocessor 380 which preferably includes, inter alia, encryption/decryption capabilities. Such a main microprocessor may beneficially be included in the secure keypad devices and data entry devices described hereinbelow with reference to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
Reference is now made to
As seen in
In accordance with one embodiment of the invention, functional units 902 and 904 may be embodied in a microprocessor included on an OFN module, such as OFN module 142 (
The key displacement analysis unit 902 is preferably operable to ascertain which of a plurality of mechanical keys is mechanically depressed and to provide a corresponding output indication, preferably via a secure connection to a data receiver, such as a PIN data receiving module 906. The key displacement analysis unit 902 preferably employs optical information received from the OFN module including at least one of size, shape and intensity of reflected optical image elements.
The image-based tamper detection unit 904 is operative, for example, as described hereinabove with respect to one or more of the embodiments shown in
It is appreciated that both the key displacement analysis unit 902 and the image-based tamper detection unit 904 may receive stored information from an approved key-depression database 910, which stores data, such as image data or data derived therefrom, which corresponds to depressions of predetermined keys or combinations thereof.
The key displacement analysis unit 902 preferably employs the information stored in the database 910 for key displacement identification and the image-based tamper detection unit 904 preferably employs the information stored in the database 910 for eliminating false tamper alarms when actual key displacement to at least a predetermined extent is detected.
It is appreciated that the OFN circuitry in any of the OFN modules, such as OFN module 142 (
For the sake of conciseness, reference is made in the following discussion to one example, namely OFN module 142 (
Turning now to the example illustrated in
a. the tool that is inserted into the device is sensed by the OFN module as a foreign object, either by virtue of blocking a reflection from an identifiable marking, such as reflective surface 622, or by virtue of a reflection from the tool, which is not recognized as an identifiable marking;
b. a hole made in the device by such a tool is sensed by the OFN module as a change in the thumbprint; and
c. upon removal of the tool in a lighted environment, light enters the device via the hole, thereby flooding the interior of the device with light, which light is sensed by the OFN module.
Turning now to the example illustrated in
a. upon removal of the key, such as key 708, in a lighted environment, light enters the device via the hole remaining after removal of the key, thereby flooding the interior of the device with light, which light is sensed by the OFN module;
b. upon removal of the key, such as key 708, the absence of a readily optically identifiable marking, such as readily optically identifiable marking 736, formed on a bottom facing surface of the removed key is sensed by the OFN module;
c. removal of the key 708 produces a change in the thumbprint, which change is sensed by the OFN module.
Raw data outputted by an OFN module, such as OFN module 142 (
The OFN module typically includes a small on-board microcontroller and memory. The OFN module can operate in two operational modes: a Raw Data Mode and a Configurable Mode.
When operating in the Raw Data Mode, the OFN module sends the data array to the on board microcontroller when requested by the on board microcontroller.
When operating in the Configurable Mode, the OFN module can be programmed at the factory to sense and store in memory various alarm scenarios and to generate an alarm signal upon the occurrence of one of the pre-configured alarm scenarios. Alternatively, the OFN module can be configured to generate an alarm signal when the scene viewed by the OFN module does match a thumbprint stored in memory. Additionally, the OFN module can be configured to provide different alarm signals depending on the occurrence of different tampering scenarios as sensed by the OFN module.
Preferably, the encryption functionality of the OFN circuitry 900 vis a vis the main microprocessor 180 (
Preferably, at the factory, the main microprocessor 180 becomes aware that there is no encryption key for its OFN module 142.
The main microprocessor 180 generates an encryption key, which is typically a symmetric encryption key, and transmits it to the OFN module 142 as clear text. From then on, all communication between the main microprocessor 180 and the OFN module 142 is encrypted.
Upon occurrence of sensed tampering, the alarm detection circuitry 160 will cause the main microprocessor 180 to erase the encryption key and any other sensitive information and thus prevent further communication and PIN entry from taking place.
Considering the overall operation of the devices described hereinabove, it is appreciated that the OFN module of each device, as appropriate, can be configured, inter alia, to carry out any one or more of the following functions:
When the OFN module is not in the sleep mode, the OFN module preferably verifies its current thumbprint every second and alerts the main microprocessor if the current thumbprint differs from stored thumbprint beyond a threshold amount. If requested by the main microprocessor, the OFN module verifies its current thumbprint as a condition to allowing PIN entry. When PIN entry is allowed, key displacement to at least a predetermined extent is reported by the OFN module to the main microprocessor.
During times of inactivity, the main microprocessor periodically requests the status of the OFN module.
When the device is in a sleep mode, the OFN module goes into deep sleep mode, and wakes up every second to validate its current thumbprint. If the current thumbprint matches the stored thumbprint, the OFN module returns to the sleep mode. If the current thumbprint does not match the stored thumbprint, the OFN module records this state in a nonvolatile memory, wakes up the main microprocessor and reports the not matching current thumbprint to the main microprocessor when the main microprocessor periodically requests the current status.
It is appreciated that the system can be configured so that the OFN module determines that a tamper condition has occurred, or can be configured it only report raw data, in which configuration the main microprocessor makes all determinations of tamper conditions based, inter alia, on the raw data received from the OFN module. Additionally, any suitable combination of configurations of the OFN module and the main microprocessor is also possible.
Preferably, the OFN module will also determine which PIN keys are pressed and report PIN keys to the main microprocessor.
Alternatively the OFN module sends raw data to the main microprocessor, which determines whether a tamper condition exists or not.
It is appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of various features described hereinabove as well as variations and modifications thereto which would occur to a person of skill in the art upon reading the above description and which are not in the prior art.
This application is a continuation of U.S. patent application Ser. No. 14/802,305, filed Jul. 17, 2015, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/027,890, filed Jul. 23, 2014 and entitled “SENSITIVE DATA DEVICE”, the disclosures of which are hereby incorporated by reference in their entireties.
| Number | Name | Date | Kind |
|---|---|---|---|
| 3466643 | Moorefield | Sep 1969 | A |
| 3735353 | Donovan et al. | May 1973 | A |
| 4417824 | Paterson et al. | Nov 1983 | A |
| 4486637 | Chu | Dec 1984 | A |
| 4527030 | Oelsch | Jul 1985 | A |
| 4593384 | Kleijne | Jun 1986 | A |
| 4749368 | Mouissie | Jun 1988 | A |
| 4807284 | Kleijne | Feb 1989 | A |
| 4836636 | Obara et al. | Jun 1989 | A |
| 4837425 | Edwards | Jun 1989 | A |
| 4847595 | Okamoto | Jul 1989 | A |
| 4877947 | Mori | Oct 1989 | A |
| 5086292 | Johnson et al. | Feb 1992 | A |
| 5237307 | Gritton | Aug 1993 | A |
| 5239664 | Verrier et al. | Aug 1993 | A |
| 5321143 | Sharpless et al. | Jun 1994 | A |
| 5353350 | Unsworth et al. | Oct 1994 | A |
| 5506566 | Oldfield et al. | Apr 1996 | A |
| 5561282 | Price et al. | Oct 1996 | A |
| 5586042 | Pisau et al. | Dec 1996 | A |
| 5675319 | Rivenberg et al. | Oct 1997 | A |
| 5861662 | Candelore | Jan 1999 | A |
| 5877547 | Rhelimi | Mar 1999 | A |
| 5998858 | Little et al. | Dec 1999 | A |
| 6272562 | Scott | Aug 2001 | B1 |
| 6288640 | Gagnon | Sep 2001 | B1 |
| 6359338 | Takabayashi | Mar 2002 | B1 |
| 6396400 | Epstein, III et al. | May 2002 | B1 |
| 6414884 | DeFelice et al. | Jul 2002 | B1 |
| 6438825 | Kuhn | Aug 2002 | B1 |
| 6463263 | Fellner et al. | Oct 2002 | B1 |
| 6466118 | Van Zeeland et al. | Oct 2002 | B1 |
| 6552713 | Van Brocklin | Apr 2003 | B1 |
| 6561659 | Hsu | May 2003 | B1 |
| 6563488 | Rogers et al. | May 2003 | B1 |
| 6633241 | Kaikuranta et al. | Oct 2003 | B2 |
| 6646565 | Fu et al. | Nov 2003 | B1 |
| 6830182 | Izuyama | Dec 2004 | B2 |
| 6853093 | Cohen et al. | Feb 2005 | B2 |
| 6874092 | Motoyama et al. | Mar 2005 | B1 |
| 6912280 | Henry | Jun 2005 | B2 |
| 6917299 | Fu et al. | Jul 2005 | B2 |
| 6921988 | Moree | Jul 2005 | B2 |
| 6936777 | Kawakubo | Aug 2005 | B1 |
| 7042371 | Tervonen et al. | May 2006 | B2 |
| 7170409 | Ehrensvard et al. | Jan 2007 | B2 |
| 7214874 | Dangler | May 2007 | B2 |
| 7270275 | Moreland | Sep 2007 | B1 |
| 7283066 | Shipman | Oct 2007 | B2 |
| 7309012 | Von Mueller et al. | Dec 2007 | B2 |
| 7497378 | Aviv | Mar 2009 | B2 |
| 7573463 | Liess | Aug 2009 | B2 |
| 7671324 | Fleischman | Mar 2010 | B2 |
| 7784691 | Mirkazemi-Moud et al. | Aug 2010 | B2 |
| 7843339 | Kirmayer | Nov 2010 | B2 |
| 7898413 | Hsu et al. | Mar 2011 | B2 |
| 8212161 | Chou | Jul 2012 | B2 |
| 8577042 | Worthy | Nov 2013 | B2 |
| 8847923 | Bowen | Sep 2014 | B1 |
| 9013336 | Schulz et al. | Apr 2015 | B2 |
| 9201511 | Spurlock | Dec 2015 | B1 |
| 9394723 | Roth | Jul 2016 | B1 |
| 9605167 | Gazaway | Mar 2017 | B2 |
| 9751668 | Warden | Sep 2017 | B2 |
| 10218383 | McNicoll | Feb 2019 | B2 |
| 20020002683 | Benson et al. | Jan 2002 | A1 |
| 20030025617 | Kunigkeit et al. | Feb 2003 | A1 |
| 20040031673 | Levy | Feb 2004 | A1 |
| 20040041792 | Criscione | Mar 2004 | A1 |
| 20040118670 | Park et al. | Jun 2004 | A1 |
| 20040120101 | Cohen et al. | Jun 2004 | A1 |
| 20050081049 | Nakayama et al. | Apr 2005 | A1 |
| 20050184870 | Galperin et al. | Aug 2005 | A1 |
| 20050275537 | Kerr | Dec 2005 | A1 |
| 20060049255 | Mueller et al. | Mar 2006 | A1 |
| 20060049256 | Mueller et al. | Mar 2006 | A1 |
| 20060109239 | Hsiung | May 2006 | A1 |
| 20060109251 | Kelly | May 2006 | A1 |
| 20060139185 | Bonnat | Jun 2006 | A1 |
| 20060192653 | Atkinson et al. | Aug 2006 | A1 |
| 20060201701 | Coleman et al. | Sep 2006 | A1 |
| 20060208089 | Sadler | Sep 2006 | A1 |
| 20070040674 | Hsu | Feb 2007 | A1 |
| 20070109152 | Wald | May 2007 | A1 |
| 20070152042 | Mittler | Jul 2007 | A1 |
| 20070152839 | Dalzell | Jul 2007 | A1 |
| 20070204173 | Kuhn | Aug 2007 | A1 |
| 20080073491 | Fleischman | Mar 2008 | A1 |
| 20080135617 | Aviv | Jun 2008 | A1 |
| 20080180245 | Hsu et al. | Jul 2008 | A1 |
| 20080218849 | Uhl | Sep 2008 | A1 |
| 20080278353 | Smith et al. | Nov 2008 | A1 |
| 20080308619 | Adam | Dec 2008 | A1 |
| 20090058628 | Kirmayer | Mar 2009 | A1 |
| 20090179869 | Slotznick | Jul 2009 | A1 |
| 20090184850 | Schulz | Jul 2009 | A1 |
| 20100058077 | Matsuda | Mar 2010 | A1 |
| 20100258419 | Chung | Oct 2010 | A1 |
| 20100271839 | Chan | Oct 2010 | A1 |
| 20100287624 | Lindqvist | Nov 2010 | A1 |
| 20110063109 | Ostermoller | Mar 2011 | A1 |
| 20110100788 | Eck | May 2011 | A1 |
| 20110215938 | Neo | Sep 2011 | A1 |
| 20110248860 | Avital | Oct 2011 | A1 |
| 20110279279 | Mirkazemi-Moud | Nov 2011 | A1 |
| 20110316805 | Yamada | Dec 2011 | A1 |
| 20120018288 | Rollet | Jan 2012 | A1 |
| 20120020045 | Tanase | Jan 2012 | A1 |
| 20120047374 | Klum | Feb 2012 | A1 |
| 20120056813 | Shih | Mar 2012 | A1 |
| 20120068846 | Dalzell | Mar 2012 | A1 |
| 20130072771 | Gu | Mar 2013 | A1 |
| 20130099009 | Filson | Apr 2013 | A1 |
| 20130127722 | Gu | May 2013 | A1 |
| 20130240739 | Shpater | Sep 2013 | A1 |
| 20130283386 | Lee | Oct 2013 | A1 |
| 20130342313 | Conlin | Dec 2013 | A1 |
| 20140132516 | Tsai | May 2014 | A1 |
| 20140240234 | Bylander | Aug 2014 | A1 |
| 20140306894 | Lee | Oct 2014 | A1 |
| 20150061901 | Casparian | Mar 2015 | A1 |
| 20150077256 | Maddox | Mar 2015 | A1 |
| 20150185864 | Schulz | Jul 2015 | A1 |
| 20150314927 | Warden | Nov 2015 | A1 |
| 20160066391 | Delnoij | Mar 2016 | A1 |
| 20170063450 | Paulussen | Mar 2017 | A1 |
| 20180059025 | Jiang | Mar 2018 | A1 |
| Number | Date | Country |
|---|---|---|
| 201984457 | Sep 2011 | CN |
| 202306504 | Jul 2012 | CN |
| 22 41 738 | Mar 1973 | DE |
| 60 101 096 | Jul 2004 | DE |
| 0375545 | Jun 1990 | EP |
| 0375545 | Feb 1995 | EP |
| 1421549 | May 2004 | EP |
| 1432031 | Jun 2004 | EP |
| 1676182 | Jul 2006 | EP |
| 892198 | Mar 1962 | GB |
| 1 369 739 | Oct 1974 | GB |
| 2 178 235 | Feb 1987 | GB |
| 2 353 401 | Feb 2001 | GB |
| 2 372 363 | Aug 2002 | GB |
| 2 411 756 | Sep 2005 | GB |
| 10293915 | Nov 1998 | JP |
| 2002-108711 | Apr 2002 | JP |
| 0163994 | Aug 2001 | WO |
| 2005086546 | Sep 2005 | WO |
| 2010082190 | Jul 2010 | WO |
| Entry |
|---|
| An Office Action dated May 28, 2004, which issued during the prosecution of U.S. Appl. No. 10/326,726. |
| An International Search Report and a Written Opinion both dated Apr. 30, 2012, which issued during the prosecution of Applicant's PCT/US2012/020142. |
| Kremin, et al., “Capacitance sensing—waterproof capacitance sensing”, Cypress Perform, Dec. 2006. |
| An Office Action dated Jul. 11, 2014, which issued during the prosecution of U.S. Appl. No. 12/355,857. |
| Van Ess, Dave; “Capacitive touch switches for automotive applications”, http://www.automotivedesignline.com/, Feb. 2006. |
| An Office Action dated Apr. 10, 2012, which issued during the prosecution of U.S. Appl. No. 12/758,150. |
| An Office Action dated May 13, 2010, which issued during the prosecution of Applicant's U.S. Appl. No. 11/845,435. |
| A Notice of Allowance dated Sep. 10, 2010, which issued during the prosecution of Applicant's U.S. Appl. No. 11/845,435. |
| A Notice of Allowance dated Oct. 23, 2008, which issued during the prosecution of U.S. Appl. No. 11/636,369. |
| U.S. Appl. No. 61/011,993, filed Jan. 22, 2008. |
| A Notice of Allowance dated Oct. 26, 2004, which issued during the prosecution of Applicant's U.S. Appl. No. 10/326,726. |
| An International Preliminary Report on Patentability dated Jul. 19, 2011, which issued during the prosecution of Applicant's PCT/IL2009/000724. |
| An Office Action dated Mar. 13, 2008 which issued during the prosecution of U.S. Appl. No. 11/636,369. |
| A Notice of Allowance dated Dec. 19, 2014, which issued during the prosecution of Applicant's U.S. Appl. No. 12/355,857. |
| Supplementary European Search Report dated Oct. 31, 2013 which issued during the prosecution of Applicant's European App No. 07869932. |
| An Office Action dated Oct. 16, 2012, which issued during the prosecution of U.S. Appl. No. 12/355,857. |
| An Office Action dated May 11, 2012, which issued during the prosecution of U.S. Appl. No. 12/355,857. |
| U.S. Appl. No. 62/027,890, filed Jul. 23, 2014. |
| Number | Date | Country | |
|---|---|---|---|
| 20180173903 A1 | Jun 2018 | US |
| Number | Date | Country | |
|---|---|---|---|
| Parent | 14802305 | Jul 2015 | US |
| Child | 15900317 | US |